Mostrando 12,041 - 12,060 Resultados de 12,164 Para Buscar '"Transporter"', tiempo de consulta: 0.12s Limitar resultados
  1. 12041
    por Merk, Olaf
    Publicado 2011
    “…Les principales politiques à l’égard des ports, des transports, du développement économique, ainsi que de l’innovation, de l’environnement et de l’aménagement du territoire ont été évaluées. …”
    Capítulo de libro electrónico
  2. 12042
    Publicado 2015
    “…Lesson 1: Overview of TCP/IP In Lesson 1, you start by understanding both the OSI networking model and the TCP/IP Protocol Suite; then, move on to Transport Layer and Internet Layer Protocols and wrap up with Sockets. …”
    Video
  3. 12043
    Publicado 2017
    “…The RESTful web services use HTTP as the transport protocol and can use any message formats, including XML, JSON(widely used), CSV, and many more, which makes it easily inter-operable across different languages and platforms. …”
    Libro electrónico
  4. 12044
    Publicado 2018
    “…By studying industry trends in the financial services sector, healthcare industry, and the transport industry, you'll discover how the options and possibilities for you and your clients are being transformed by the Blockchain across Oracle. …”
    Libro electrónico
  5. 12045
    Publicado 2015
    “…MASTER NUTS-AND-BOLTS OPERATIONAL BEST PRACTICES Improve procurement, transportation, warehousing, ordering, reverse logistics, and more BUILD A BETTER GLOBAL SUPPLY CHAIN Manage new risks as you improve sustainability STRENGTHEN KEY LINKAGES WITH YOUR PARTNERS AND CUSTOMERS Get supply chains right by getting collaboration right PREVIEW THE FUTURE OF SUPPLY CHAINS—AND Discover “where the puck is headed”—so you can get there first YOUR SUPPLY CHAIN..…”
    Libro electrónico
  6. 12046
    Publicado 2016
    “…Create and manage unique Minecraft 1.9 configurations with their own versions, worlds, resource packs, and profiles Automatically mass-produce sugar cane, melons, wheat, and more Supercharge mining operations to excavate infinite amounts of obsidian Take control of the mayhem with mob farms: mass-produce your own zombies, spiders, creepers, and skeletons Craft amazing armor, weapons, and tools Build in any style that inspires you: medieval, Victorian, Viking, Japanese, modern, suburban, you name it Create natural-looking terrain and trees, decorate with 2D pixel art, and build 3D statues Construct smarter, more efficient power and transportation systems Assemble amazing redstone circuitry with Monostable and Redpower 2 Generate massive resources with gigantic oil refineries and quarries Create and share exciting adventure maps and learn the secrets of CommandBlocks Export your greatest adventures to YouTube, Vimeo, or HD video Stephen O’Brien is author of the mega-bestselling The Ultimate Player’s Guide to Minecraft as well as many other books. …”
    Libro electrónico
  7. 12047
    Publicado 2014
    “…The 13 video lessons cover the following topics: * Introduction to NX-OS * Layer 2 Support and Configurations * Layer 3 Support and Configurations * IP Multicast Configuration * Security * High Availability * Embedded Serviceability Features * Unified Fabric * Nexus 1000v * Quality of Service (QoS) * Overlay Transport Virtualization (OTV) * MPLS * LISP About the Instructors Ron Fuller , CCIE No. 5851 (Routing and Switching/Storage Networking), is a technical marketing engineer (TME) on the Nexus 7000 team for Cisco. …”
    Video
  8. 12048
    Publicado 2007
    “…Tactics and strategy: protecting Internet infrastructure from top to bottom Building more secure transport, messaging, identities, networks, platforms, and more Gaining safety without sacrificing the Internet’s unique power and value Making the Internet safer for honest people without sacrificing ubiquity, simplicity, or privacy Spam: draining the swamp, once and for all Why spam contributes to virtually every form of Internet crime–and what we can do about it Design for deployment: how to really make it happen Defining security objectives, architecture, strategy, and design–and evangelizing them How to Build a Safer, Better Internet You’ll find yourself deeply concerned, then fascinated, then hopeful as you read about • Building an Internet that resists online crime • Phishing, botnets, and spam: tactical, workable, immediate countermeasures • Establishing the “Accountable Web”: a strategic, long-term solution to Internet crime • Improving security without sacrificing what people love about the Internet The Internet is today’s Wild West: too much lawlessness, too little accountability. …”
    Libro electrónico
  9. 12049
    Publicado 2010
    “…Yet up to fifty percent of the iodine in iodized salt can be lost during storage, transportation, and Indian cooking. Using world-class technology, Hindustan Lever Ltd. has developed a more stable iodine for salt that is effective in preventing IDD and affordable; using village-based entrepreneurs to sell products in remote areas, HLL is ensuring its availability, as well as providing jobs, income, and self-respect for the poor. …”
    Video
  10. 12050
    por Goujard, Antoine
    Publicado 2015
    “…Parmi les industries de réseaux, c’est dans le secteur des télécommunications que la concurrence a le plus progressé, mais elle reste perfectible dans les transports et l’énergie. Ce Document de travail se rapporte à l’Étude économique de l’OCDE de la France 2015 (www.oecd.org/fr/eco/etudes/etude-economique-france.htm)…”
    Capítulo de libro electrónico
  11. 12051
    por Rawlins, Michael C.
    Publicado 2004
    “…Inside you'll find: A concise tutorial for learning to read W3C XML schemas An introduction to using XSLT to transform between different XML formats Simple, pragmatic advice on transporting XML documents securely over the Internet For developers working with either MSXML with Visual C++ or Java and Xerces: See Chapter 3 for a step-by-step guide to enabling existing business applications to export XML documents See Chapter 2 for a step-by-step guide to enabling existing business applications to import XML documents See Chapter 5 for code examples and tips for validating XML documents against schemas See Chapter 12 for general tips on building commerce support into an application For end users who need a simple and robust conversion utility: See Chapter 7 for converting CSV files to and from XML See Chapter 8 for converting flat files to and from XML See Chapter 9 for converting X12 EDI to and from XML See Chapter 11 for tips on how to use these techniques together for complex format conversions The resource-filled companion Web site (www.rawlinsecconsulting.com/booksupplement) includes executable versions of the utilities described in the book, full source code in C++ and Java, XSLT stylesheets, bug fixes, sample input and output files, and more. 0321154940B07142003…”
    Libro electrónico
  12. 12052
    Publicado 2008
    “…Coverage includes Using WCF contracts to define complex structures and interfaces Understanding WCF’s channel stacks and channel model architecture Configuring the WCF communication stack to use only the protocols you need Using standard and custom service behaviors to manage concurrency, instances, transactions, and more Serializing data from .NET types to XML Infosets and representing Infosets “on the wire” Hosting WCF services via IIS, managed .NET applications, and Windows Activation Services WCF security, in depth: authentication; transport and message-level security; and Internet and intranet scenarios Improving reliability: exception handling, diagnostics, and more Workflow services: new integration points between WCF 3.5 and Windows Workflow Foundation Building client-to-client, peer network-based applications Utilizing WCF for non-SOAP Web services: AJAX and JSON examples and .NET 3.5 hosting classes Microsoft’s Steve Resnick , Richard Crane , and Chris Bowen are technology experts at the Microsoft Technology Center in Boston. …”
    Libro electrónico
  13. 12053
    Publicado 2008
    “…Remember, XML is designed to store and transport data, not display it. • Parts 3 and 4 of the book discuss DTD and XML Schema, languages designed to define the structure of an XML document. …”
    Libro electrónico
  14. 12054
    Publicado 2009
    “…Explores how to green each phase of your Data Center project including site selection, physical design, construction, and hardware selection Offers green strategies for all Data Center technologies including power, cooling, cabling, fire suppression, and virtualization Presents IT and facilities design (and retrofitting) strategies that can save hundreds of thousands of dollars per year in energy costs Reveals financial incentive programs to help pay for green Data Center initiatives Outlines Data Center efficiency metrics and environmental building assessment systems used worldwide to rate how green a facility is Highlights the lessons of dozens of case studies and real-world installations pertaining to energy efficiency, green building projects, and Data Center technologies Addresses broader green business practices including proper e-waste disposal, water conservation, and fostering alternative transportation Related Ti..…”
    Libro electrónico
  15. 12055
    Publicado 2008
    “…Die Funktionsweise von Transport Layer Security (TLS) und Secure Shell (SSH) stehen dabei im Vordergrund. …”
    Libro electrónico
  16. 12056
    “…The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a key missing link: most businesses still connect to their service providers via old-fashioned, inflexible TDM trunks. …”
    Libro electrónico
  17. 12057
    Publicado 2021
    “…The increase of temperature and precipitation in many places in the world affect the transport and dissemination of infectious agents and the growth as well as survival of pathogens and vectors, particularly through water and sanitation systems. …”
    Libro electrónico
  18. 12058
    Publicado 2020
    “…Avalanches cause the highest number of fatalities in the Alps, threatening many areas and facilities, as well as transport and communications infrastructure. An integral part of avalanche protection is risk communication and warning, which is within the domain of the avalanche service of the Slovenian Environmental Agency. …”
    Libro electrónico
  19. 12059
    Publicado 2017
    “…Coverage includes What IoT is and how it is transforming businesses Common IoT challenges, building blocks, and architectures Core IoT networking protocols, including the 802.15.4 and LPWA families Models for protecting security and integrity in IoT networks Simple, low-cost IoT networks for homes and small businesses IPv6 adaptations for low power and lossy IoT networks IoT management protocols, including CoAP, MQTT, and SCADA Moving processing to the edge and to the “fog” layer Using data analytics to maximize the value of IoT systems Analyzing IoT data with Hadoop, Kafka, Spark, and the Hadoop ecosystem Industry-specific techniques, smart objects, protocols, and analytic techniques IoT for utilities, the smart grid, and energy efficiency IoT for connected and self-driving cars, mass transit, and cargo transportation IoT for manufacturing: reducing cost and accelerating delivery IoT for smart and connected cities: lighting, parking, and public safety IoT for safer, more efficient oil/gas production and mining Skill Level All levels Learn How To Plan, organize, build, and deploy end-to-end IoT solutions Navigate today’s IoT product marketplace Use maturing IoT technologies to solve many business and technical problems Make sense of the full IoT protocol stack, from 802.15.4 and LPWA to IPv6 adaptations and management Archite..…”
    Video
  20. 12060
    Publicado 2017
    “…What You Will Learn Understand ASP.NET Core 2 and how it differs from its predecessor Address performance issues at the early stages of development Set up development environments on Windows, Mac, and Linux Measure, profile and find the most significant problems Identify the differences between development workstations and production infrastructures, and how these can exacerbate problems Boost the performance of your application but with an eye to how it affects complexity and maintenance Explore a few cutting-edge techniques such as advanced hashing and custom transports In Detail The ASP.NET Core 2 framework is used to develop high-performance and cross-platform web applications. …”
    Libro electrónico